SPBIG

Exposing a Facebook scammer Out to scam Students

Hello all, my attention was drawn to SAMUEL AGOZIE'S profile after a friend of mine told me about her intentions of buying some of the items he has for sale. I took...
wannacry worm-john

Technical Information About the Wannacry Ransomware Attack

WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered Ransomware Worm   Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate. ...
SPBIG

SCAMPOLICE GROUP SCAMMER E-MAIL ADDRESSES DATABASE

SCAMPOLICE GROUP SCAMMER E-MAIL ADDRESSES DATABASE  Scampolice Group warns you: Our lists are copyright under Creative Commons license. This means you can only reproduce them with reference to the owners.  We feed our data...
formbook form grabber

FormBook Form Grabber Malware

More and more we’ve been seeing references to a malware family known as FormBook. Per its advertisements it is an infostealer that steals form data from various web browsers and other...
image_sitemaps_and_seo

optimizing images for search engines

If you are, for instance, a blogger or you write articles for an online magazine or newspaper, you might encounter this question on a daily basis: should I add an image to my...
stock-vector-trojan-computer-virus-alert-sign-vector-illustration-166548911

Introduction to TROJANS -List of Trojans and how to stay safe

What is a Trojan? A trojan is a type of malware that, unlike viruses and worms, does not self-replicate. Named after the mythological wooden horse used to sneak Greek warriors through the...
Google-Dorks-Ultimate-Collection-For-Hackers

Google Dorks – Google Hacking – Manipulating Google search strings

Introduction to Google Dorking An average internet user might feel that he/she can use the google search very but that's not entirely true we have the advanced Google Search Users and they...
Hacked-E-e

What to do After Being Hacked – Recovery tips

Recovering from a Hack can be overwhelming. Not only do you have to deal with restoring your site to a good working state, you also need to take steps to help...
TipsforDetectingHackedWebsiteEarly_1340px

Preventive Measures to save your Website from being Hacked

Website security is a topic on a lot of users' minds. If you search the web for How to hack a website, you will literally get millions of hits. Taking the necessary...

How to force your website to load with your dedicated SSL using the .htaccess...

Sometimes it's necessary to make sure your website’s visitors use the SSL encrypted connection. Forcing visitors to use SSL can be accomplished through your .htaccess file using mod_rewrite. If you’d like more information...
- Advertisement -

LATEST NEWS

MUST READ

Do you need the help of an IT Professional?
View My portfolio!!!

John is ready to assist you in your next project if you need the help of a freelancer.
If you need a long time boost in the productivity of your organization, I am also available for full time Employment.

Excerpts of my skill range covers!!!

  • Website security
  • Server Management
  • Database Managment
  • Website Development
  • Software Development
  • Entrepreneurship
  • Social media marketing
  • E-commerce
  • SEO (Search Engine Optimization)
  • Business Development
  • Project Management
  • Digital Marketing
  • Product Marketing
Contact John

Use the form below to contact me; I typically respond same day.

If you Need a Quicker Assistance you can call me instead!!!
+234 07038583101

Thank You!!!
I will Get Back To You as Soon As Possible!!!